Publications
clear filter)
: Holderer J (Conference papers
Years: 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 | 1992 | 1991 | 1986back to the top of all publications
2016
back to the year overview- Zahoransky R, Holderer J, Lange A, Brenig C
Process Analysis as First Step Towards Automated Business Security
2016 24th European Conference on Information Systems, Istanbul, Turkey, June 12-15, 2016 - Holderer J, Carmona J, Müller G
Security-Sensitive Tackling of Obstructed Workflow Executions
2016 Proceedings of the International Workshop on Algorithms & Theories for the Analysis of Event Data, Torun, Poland, June 20-21, 2016, pages: 126 - 137
2015
back to the year overview- Holderer J, Accorsi R, Müller G
When four-eyes become too much: a survey on the interplay of authorization constraints and workflow resilience
2015 Proceedings of the 30th Annual ACM Symposium on Applied Computing, Salamanca, Spain, April 13-17, 2015, pages: 1245 - 1248
2014
back to the year overview- Accorsi R, Holderer J, Stocker T, Zahoransky R
Security Workflow Analysis Toolkit
2014 Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 19.-21. März 2014, Wien, Österreich, volume: 228, pages: 433 - 442 - Holderer J
cLog: Complex Event Log Synthesis Tool
2014 Multikonferenz Wirtschaftsinformatik, Paderborn